Talk:Host-based intrusion detection system
Appearance
![]() | Computing Stub‑class | |||||||||
|
![]() | Computer security: Computing Stub‑class Mid‑importance | |||||||||||||||||
|
- This page has lots of claims that are invalid (operation of HIDS, etc).
- Some of this could end up well on a HIPS page.
- This article is made of fail, in need of a complete re-write. Like this line "(Crackers are a competitive bunch...) Again, one can detect (and learn from) such changes." —Preceding unsigned comment added by 80.253.137.5 (talk) 09:57, 13 September 2008 (UTC)
Protecting the HIDS
militating? Surely there is a better word to use in that sentence in the section on Protecting the HIDS. It's not clear what that sentence even means. Oswald Glinkmeyer (talk) 21:52, 2 April 2009 (UTC)